Free DS0-001 Exam Braindumps (page: 7)

Page 6 of 21

A database administrator needs to ensure database backups are occurring on a daily basis and at scheduled times.
Which of the following actions should the administrator take?

  1. Query the database to observe entries.
  2. Check the database schema.
  3. Review the backup media.
  4. Review the server logs for entries.

Answer(s): D

Explanation:

The action that the administrator should take is to review the server logs for entries. Server logs are files that record the events and activities that occur on a server, such as database backups, errors, warnings, or failures. By reviewing the server logs, the administrator can verify that the database backups are occurring on a daily basis and at scheduled times, and also identify any issues or anomalies that may affect the backup process or the backup quality. The other options are either not relevant or not sufficient for this task. For example, querying the database to observe entries may not show the backup status or frequency, checking the database schema may not reflect the backup schedule or policy, and reviewing the backup media may not indicate the backup time or duration.


Reference:

CompTIA DataSys+ Course Outline, Domain 5.0 Business Continuity, Objective

5.2 Given a scenario, implement backup and restoration of database management systems.



Which of the following is a result of an on-path attack on a system?

  1. A Wi-Fi network that redirects to clones of legitimate websites
  2. A website that has crashed and is no longer accessible
  3. An email from an unknown source requesting bank account details
  4. A web application that returns the addresses of its customers

Answer(s): A

Explanation:

A result of an on-path attack on a system is a Wi-Fi network that redirects to clones of legitimate websites. An on-path attack is a type of attack that intercepts and modifies the traffic between two parties without their knowledge or consent. An attacker can use an on-path attack to create a rogue Wi-Fi network that mimics a legitimate one, and then redirect the users to fake websites that look like the ones they intended to visit. The attacker can then steal the users' personal or financial information, such as usernames, passwords, credit card numbers, or bank account details. The other options are either results of different types of attacks or not related to attacks at all. For example, a website that has crashed and is no longer accessible may be a result of a denial-of-service attack, an email from an unknown source requesting bank account details may be a result of a phishing attack, and a web application that returns the addresses of its customers may be a result of a poor design or a data breach.


Reference:

CompTIA DataSys+ Course Outline, Domain 4.0 Data and Database Security, Objective 4.4 Given a scenario, identify common types of attacks against databases.



Which of the following is the best way to migrate a large data load from one table to another, considering total time and blocking?

  1. Split the load size into many transactions.
  2. Split the load size in half and run simultaneously.
  3. Batch into small loads and run in parallel.
  4. Batch large loads into one transaction.

Answer(s): C

Explanation:

The best way to migrate a large data load from one table to another, considering total time and blocking, is to batch into small loads and run in parallel. This means that the large data load is divided into smaller chunks that can be processed simultaneously by multiple threads or processes. This reduces the total time required for the migration and also minimizes the blocking of other operations on the tables involved. The other options are either less efficient or more prone to blocking. For example, splitting the load size into many transactions may increase the overhead and latency of each transaction; splitting the load size in half and running simultaneously may still cause blocking or contention; batching large loads into one transaction may take longer and lock the tables for longer periods.


Reference:

CompTIA DataSys+ Course Outline, Domain 3.0 Database Management and Maintenance, Objective 3.3 Given a scenario, migrate data between databases.



Following a security breach, a database administrator needs to ensure users cannot change data unless a request is approved by the management team.
Which of the following principles addresses this issue?

  1. Open access
  2. Least resistance
  3. Elevated privilege
  4. Least privilege

Answer(s): D

Explanation:

The principle that addresses this issue is least privilege. Least privilege is a security principle that states that users should only have the minimum level of access or permissions required to perform their tasks or roles. By applying this principle, the administrator can ensure that users cannot change data unless they have been authorized by the management team through a request approval process. This prevents unauthorized or accidental modifications of data that may compromise its integrity or security. The other options are either opposite or unrelated to this principle. For example, open access means that users have unrestricted access to data; least resistance means that users have the easiest or most convenient access to data; elevated privilege means that users have higher or more permissions than they need.


Reference:

CompTIA DataSys+ Course Outline, Domain 4.0 Data and Database Security, Objective 4.1 Given a scenario, apply security principles and best practices for databases.






Post your Comments and Discuss CompTIA DS0-001 exam with other Community members:

DS0-001 Discussions & Posts